Tech

219 bookmarks
Custom sorting
Preventing the Next Major Security Breach (Cloud Next '18) - YouTube
Preventing the Next Major Security Breach (Cloud Next '18) - YouTube
Docker has revolutionized the way we package and deploy software to the cloud. However, when it comes to securing our applications, we have many of the same old challenges. How do we know the software we’re running is secure? When new vulnerabilities come up, how can we roll out fixes quickly, and without service interruptions? In this talk we’ll talk about Google’s approach to securing your build pipeline, detecting vulnerabilities in production, and, of course, methods to prevent vulnerabilities from ever getting there. SEC208 Event schedule → http://g.co/next18 Watch more Security sessions here → http://bit.ly/2zJTZml Next ‘18 All Sessions playlist → http://bit.ly/Allsessions Subscribe to the Google Cloud channel! → http://bit.ly/NextSub re_ty: Publish; product: Cloud - General; fullname: Justin Beckwith; event: Google Cloud Next 2018;
Preventing the Next Major Security Breach (Cloud Next '18) - YouTube
Latacora - The SOC2 Starting Seven
Latacora - The SOC2 Starting Seven
So, you plan to sell your startup’s product to big companies one day. Congratu-dolences! Really, that’s probably the only reason you should care about this article. If that’s not you, go forth and live your life! We’ll ask no more of your time. For the rest of you: Industry people talk about SOC2 a lot, and it’s taken on a quasi-mystical status, not least because it’s the product of the quasi-mystical accounting industry.
Latacora - The SOC2 Starting Seven
11 Ways (Not) to Get Hacked - Kubernetes
11 Ways (Not) to Get Hacked - Kubernetes
Author: Andrew Martin (ControlPlane) Kubernetes security has come a long way since the project's inception, but still contains some gotchas. Starting with the control plane, building up through workload and network security, and finishing with a projection into the future of security, here is a list of handy tips to help harden your clusters and increase their resilience if compromised. Part One: The Control Plane 1. TLS Everywhere 2. Enable RBAC with Least Privilege, Disable ABAC, and Monitor Logs 3.
11 Ways (Not) to Get Hacked - Kubernetes
Kubernetes Network Policies - A Detailed Security Guide | StackRox
Kubernetes Network Policies - A Detailed Security Guide | StackRox
The container orchestrator war is over, and Kubernetes has won. With companies large and small rapidly adopting the platform, security has emerged as an important concern – partly because of the learning curve inherent in understanding any new infrastructure, and partly because of recently announced vulnerabilities.
Kubernetes Network Policies - A Detailed Security Guide | StackRox
Securing a Cluster - Kubernetes
Securing a Cluster - Kubernetes
This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
Securing a Cluster - Kubernetes
GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. - GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet ...
GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.